The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Thunderbird: several vulnerabilities
Several vulnerabilities were announced in Thunderbird, the worst one leading to code execution...
Firefox: several vulnerabilities
Several vulnerabilities were announced in Firefox, the worst one leading to code execution...
Cisco VPN, IOS, PIX, Catalyst: denial of service via IKE
An attacker can send few IKE packets per second in order to saturate Cisco VPN Concentrator, IOS, Catalyst and PIX...
KDE: screensaver lock not activated
In some cases, the X session does not lock...
Firewall-1: file reading
An attacker can connect to the 18264/tcp web server in order to read a file from system...
Postfix: session established without TLS
In some cases, the SMTP session does not use TLS, which can lead to capture of data...
fbi: code execution via fbgs
When fbgs is called on a malicious Postscript file, code can be run with user's rights...
GnuPG: denial of service of parse_comment
An attacker can create a file leading to a denial of service in parse_comment() function of parse-packet.c of GnuPG...
Tomcat: directory listing
An attacker can use a reserved character to list a directory...
Solaris: bypassing IP routing
An attacker can connect to a service without using routes defined in routing table...
Solaris: reading memory via sysinfo
A local attacker can call sysinfo() to read a portion of kernel memory...
Ruby: vulnerabilities of alias and directory
Two vulnerabilities in alias and directory operations can be used in Ruby...
PHP: file reading via compress.zlib
A local attacker can use compress.zlib to bypass safe mode restrictions...
Konqueror: denial of service of replaceChild
An attacker can create a malicious HTML page stopping Konqueror when it is displayed...
Solaris: denial of service of Event Port
A local attacker can stop system via a software using the Event Port API...
Solaris: denial of service via /net
A local attacker can use a mount point such as /net in order to stop system...
Solaris: denial of service via kmdb
A local attacker can use kmdb to stop system...
Solaris: denial of service of kernel
A local or network attacker can stop system...
PcAnywhere: privilege elevation
A local attacker can replace the host file of CallerID authentication in order to elevate his privileges...
Linux kernel: denial of service of ftdi_sio
An attacker can use all system memory by sending a lot of data to the serial port...
fastjar: extracting files outside current directory
An attacker can create a malicious jar archive in order to force fastjar to extract files outside current directory...
Oracle Application Server: several vulnerabilities of July 2006
Several vulnerabilities are corrected by CPU of July 2006...
Oracle Database: several vulnerabilities of July 2006
Several vulnerabilities are corrected by CPU of July 2006...
Wireshark, Ethereal: several vulnerabilities
Several vulnerabilities of Wireshark permit a remote attacker to conduct a denial of service or to run code...
Outpost Firewall: buffer overflow of filtnt.sys
A local attacker can generate an overflow in filtnt.sys in order to generate a denial of service and eventually to execute code...
Outpost Firewall: opening a privileged explorer
A local attacker can use Outpost Firewall to open an explorer running with SYSTEM privileges...
MySQL: format string attack of date_format
An authenticated attacker can use the date_format() function to stop MySQL and eventually to execute code...
Solaris: denial of service of ypserv
An attacker can use a malicious request in order to stop ypserv...
Solaris: denial of service of applications using libICE
A network attacker can generate an error in libICE, stopping applications linked with this library...

   

Direct access to page 1 21 41 61 81 101 121 141 148 149 150 151 152 153 154 155 156 158 160 161 162 163 164 165 166 167 168 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022